Hero image

Raymond Chambers's Shop

Average Rating2.96
(based on 27 reviews)

My name is Ray Chambers. I'm a specialist in computing and have a first class honours degree in computer science. I'm currently the lead teacher of computer science at Brooke Weston Academy in Corby Northamptonshire. I have been teaching for roughly 8 years and I thoroughly enjoy my job. In 2015 I was fortunate to win the Pearson National Teaching Award for innovative use of technology. I also won the BAFTA for mentoring young coders.

97Uploads

53k+Views

12k+Downloads

My name is Ray Chambers. I'm a specialist in computing and have a first class honours degree in computer science. I'm currently the lead teacher of computer science at Brooke Weston Academy in Corby Northamptonshire. I have been teaching for roughly 8 years and I thoroughly enjoy my job. In 2015 I was fortunate to win the Pearson National Teaching Award for innovative use of technology. I also won the BAFTA for mentoring young coders.
Computer Science 1-9: - Data Representation Lesson 1
r_chambersr_chambers

Computer Science 1-9: - Data Representation Lesson 1

(0)
Lesson explaining how Data representation works. There is a PowerPoint which walks through two methods of conversion but it also specifies how to use binary. It explains to students place value and compares denary to binary. Lesson 1 in a series of 4 lessons. Students will also learn about: - Switches Binary Exam questions Binary conversion using switches Binary conversion using division Binary grid method Least / Most significant bit] Worksheet provided Content written by Ray Chambers - National Teaching Award Winner - 2015 - Innovative use of technology
OCR 9-1 Computer Science - Legislation Bundle - GCSE
r_chambersr_chambers

OCR 9-1 Computer Science - Legislation Bundle - GCSE

(0)
This bundle includes lessons on the following areas of the 9-1 computer science curriculum *Legal Issues *Computer Misuse Act *Freedom of Information Act *Communications Act *Data Protection Act *Copyright Designs and Patents Act *Creative commons *Open source / Proprietary Software *Ethical and cultural issues *Censorship and the internet *Computers in the workforce *Automated decision making *Privacy Issues *Computer technology used to analyse personal information *Artificial Intelligence
Key Stage 3 - Networks Lesson 3 of 6 : - Topologies
r_chambersr_chambers

Key Stage 3 - Networks Lesson 3 of 6 : - Topologies

(0)
Topologies Presentation includes notes to train teachers who are very new to teaching computing. Week 3 - What is topology? Objective: - •Understand the difference between LANs and WANs •Be able to give examples of each network •Identify three different network topologies. ​ Task 1 : - Make notes about the difference between a WAN and a LAN network as your teacher explains things to you. This video will also be shown: - https://vimeo.com/145979347 Task 2: - Your teacher will now get you to act out 3 different networks by getting you up out of your seats. They will follow this by watching this video: https://vimeo.com/145982596 Task 3: - As a class you will come up with success criteria and produce a poster which meets the criteria. You should comment on the following:•​LAN VS WAN •STAR / RING / BUS ​ Useful links: •https://vimeo.com/145979347 - WAN / LAN video •https://vimeo.com/145982596 - Topology video
Key Stage 3 - Networks Lesson 5 of 6 : - Encryption
r_chambersr_chambers

Key Stage 3 - Networks Lesson 5 of 6 : - Encryption

(0)
Week 5 - Encryption Objective: - •To identify some of the data which should be kept secure from others. •To learn some of the ways in which data is kept secure. •To learn how unauthorised people can break ciphers and read encrypted data. •To learn about classical encryption techniques. ​Task 1 : - Come up with a list of data which would need to be kept secure. Task 2 : - Your teacher will print out this worksheet for you. They can click here to download it. You should use this file to help solve the message. Click here Task 3: - You are now going to learn a little bit about brute force and the Caesar shift. •https://vimeo.com/145990347 - Watch this video and find out more about the Caesar Shift. ​ Complete the worksheet using the PowerPoint's: - Click here
Python - Year 8 - Assessment
r_chambersr_chambers

Python - Year 8 - Assessment

(0)
This is a differentiated assessment which includes old national curriculum levels. You can map these to your new school levels or progress measure quite easily. I've split it into three tasks which are all slightly different. You may use these in any way you like. The idea is that they create a quiz. Some students who are on the red task will need to make sure that they go and try some research in order to understand how a binary search would work in Python. This is why it's a higher level. Students will need to be independent on some of these tasks. I found this useful for my own teaching and it meant that the students who were lower at coding could try the lower task. In terms of challenging students, if I knew that students of higher ability would try and pick the lower tasks, I would allocate them myself. Green (easy) Amber/Orange (medium) Red (hardest) Feel free to modify.
OCR - Python 3.3 - Introductory help videos
r_chambersr_chambers

OCR - Python 3.3 - Introductory help videos

(0)
These Python videos will introduce you to the basics of Python 3.3 and will get you started by building lists, reading text, writing text, using strings, using floats, using integers and it will show you how to do conditions using IF. The videos will get you started and can be used by your students to introduce new features. All videos are encoded using MP4 / MPEG 4 List of videos: - *Writing Text *Reading Text *Multiple Lists / Arrays *Single Lists *Conditional / IF Statements *Introductory video *Int / Float / String
Python - Intro to Python Debugging / Coding Booklet
r_chambersr_chambers

Python - Intro to Python Debugging / Coding Booklet

(0)
A nice little resource made to start people on coding. It introduces common mistakes with coding and also gives them 6 activities to attempt. They have been written based on difficulty for example, it goes from green to red. Activities on this are basic string manipulation but it will be a good first lesson for students to get a taste of Python. Includes inputs, outputs and string manipulation.
Kodu Lesson 3 : - Paths (KS2/KS3)
r_chambersr_chambers

Kodu Lesson 3 : - Paths (KS2/KS3)

(0)
This lesson requires prior knowledge of Kodu and gets you thinking about paths. It introduces the path feature to them and you give your students 'tinker' time so that they can explore the tools more. Get the students to think about how they move characters in the game. Introduce automatic movement and show them how to follow other objects. Students complete the worksheet.
OCR - ALEVEL - Computer Science - Exchanging Data
r_chambersr_chambers

OCR - ALEVEL - Computer Science - Exchanging Data

(0)
Objective: - We’re learning to explain how compression methods are used in computer systems. Outcomes: - Lossy vs Lossless compression – Understanding it’s uses. Run length encoding and dictionary coding for lossless compression Symmetric and asymmetric encryption Different uses of hashing This covers the introduction to Lossy vs Lossless and talks about run length encoding and encryption. Includes a link to a khan academy video on encryption from YouTube * Referenced *
OCR Computer Science - Computer Science PseudoCode 9-1 1-9
r_chambersr_chambers

OCR Computer Science - Computer Science PseudoCode 9-1 1-9

(0)
This lesson will show students how they can use the following techniques with pseudo code. Arrays Concatenation Substring Variables Upper Lower Multidimensional Array There is a worksheet attached with answers and it should give them two lessons to try different code. I hope that this is useful for computer science students
OCR - 9-1 - Computer Pseudo worksheet questions
r_chambersr_chambers

OCR - 9-1 - Computer Pseudo worksheet questions

(0)
This work sheet is a number of questions including extension activities that will get students to program pseudocode on paper. The first part of the work sheet includes some basic questions as well as some answers on an answer sheet. It should be some good practice for the basics of pseudo code. The extension questinos are more complicated and should be done on a separate sheet or work book as practice for the students.
Pseudo Code - Array and Multidimensional Array
r_chambersr_chambers

Pseudo Code - Array and Multidimensional Array

(0)
This is a powerpoint which you can get part of a pack. It teaches you how to do a multidimensional array and shows examples of how they can be used to work out the range. Hope that it is useful to some other teachers.
Year 11 - Pseudo Code - Cheat Sheet - OCR Computer Science
r_chambersr_chambers

Year 11 - Pseudo Code - Cheat Sheet - OCR Computer Science

(0)
A year 11 Pseudo Code cheat sheet that shows the candidate how to write a program that uses concatination and it also shows the client how they can do file handling, file writing and how they can append files. It might be a useful print out for candidates to have when learning to write code.
E-Safety Log
r_chambersr_chambers

E-Safety Log

(0)
This is a tool for management or staff to use in the school for recording e-safety incidents. Many schools use CPOMS or other behaviour management tools. Unfortunately some schools do not have the money to buy more and more software to store their e-safety incidents. This is a macro based excel tool which allows schools to record any incidents. It is simple to use and you can use filters on the second page to look at the date it was recorded or updated.
Computer Science 1-9 - Networks Introduction - Topologies, Wifi and Encryption
r_chambersr_chambers

Computer Science 1-9 - Networks Introduction - Topologies, Wifi and Encryption

(0)
Objective: - We’re learning to identify different network infrastructures and the encryption involved. During this lesson there are some videos to break up the lesson and teaching notes for you to have a look at. On top of this there are some activities for them to try such as creating their own encryption key. This usually makes the lesson more engaging for the students. Content covered in this lesson: - Topologies Ring Star Bus Mesh Students to draw the network topologies and explain the advantages and disadvantages. Wifi and wifi channels Encryption using the Caesar shift and also comments on brute force. Public and private keys used in encryption.
Lesson 3 - Object Orientation - OCR - Alevel - Python - Design Class
r_chambersr_chambers

Lesson 3 - Object Orientation - OCR - Alevel - Python - Design Class

(1)
This shows students how to design a class with a class diagram. It walks through the need to design classes and there is a worksheet attached that gets the students do design the class and build the program. They can use a number of different programming opportunities with this and it will help them for their A-level project.